Handbook of Applied Cryptography
Handbook of Applied Cryptography
Key assignment for enforcing access control policy exceptions in distributed systems
Information Sciences: an International Journal
A digital secure image communication scheme based on the chaotic Chebyshev map: Research Articles
International Journal of Communication Systems
Enforcing the security of a time-bound hierarchical key assignment scheme
Information Sciences: an International Journal
Short Communication: Breaking network security based on synchronized chaos
Computer Communications
One-way hash function construction based on 2D coupled map lattices
Information Sciences: an International Journal
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
Information Sciences: an International Journal
True random number generator based on mouse movement and chaotic hash function
Information Sciences: an International Journal
A new key agreement protocol based on chaotic maps
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
A chaotic maps-based key agreement protocol that preserves user anonymity
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Information Sciences: an International Journal
Secure group key agreement protocol based on chaotic Hash
Information Sciences: an International Journal
A chaos-based symmetric image encryption scheme using a bit-level permutation
Information Sciences: an International Journal
Information Sciences: an International Journal
Keyed hash function based on a dynamic lookup table of functions
Information Sciences: an International Journal
A security-enhanced key agreement protocol based on chaotic maps
Security and Communication Networks
Cryptanalysis of a key agreement protocol based on chaotic Hash
International Journal of Electronic Security and Digital Forensics
Hi-index | 0.07 |
Based on the semi-group property of Chebyshev chaotic map and some effective improvements of our original protocol, we propose a novel chaotic maps-based key agreement protocol which is proved to be secure, feasible and extensible.